2021
DOI: 10.1155/2021/8146553
|View full text |Cite
|
Sign up to set email alerts
|

Access Control beyond Authentication

Abstract: Nowadays, the Zero Trust model has become one of the standard security models. This paradigm stipulates as mandatory the protection of each endpoint, looking for providing security to all the network. To meet this end, it is necessary to guarantee the integrity of the access control systems. One possibility for bringing security to the different endpoints is continuous authentication, as an access control system. Continuous authentication is the set of technologies capable of determining if a user’s identity r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…It provides new access control policies that embrace modern technology, such as protecting scattered and distributed cloud computing resources [28]. It protects information access using continuous authentication to ensure that only authorized users interact with the system [29]. The security paradigm has no trusted network boundary (internal network) and untrusted network boundary (external networks).…”
Section: Conceptual Frameworkmentioning
confidence: 99%
“…It provides new access control policies that embrace modern technology, such as protecting scattered and distributed cloud computing resources [28]. It protects information access using continuous authentication to ensure that only authorized users interact with the system [29]. The security paradigm has no trusted network boundary (internal network) and untrusted network boundary (external networks).…”
Section: Conceptual Frameworkmentioning
confidence: 99%
“…A smartphone or laptop can now be used to access a private company's network or data. The goal is to identify the many technologies involved in the implementations of continuous authentication, as well as the assessment methodologies and application cases [54]. This study attempts to present the recommended ways in the field of financial organization to ensure high security and authenticity, taking into account the varied applications of AI and machine learning techniques.…”
Section: Human Resources Managementmentioning
confidence: 99%